AOL Instant Messenger Filename Handling Format String
Medium Nessus Network Monitor Plugin ID 1254
SynopsisThe remote host is vulnerable to format string flaw
DescriptionThe remote host is running AOL Instant Messenger (AIM). Version 4.1.2010 of AIM is vulnerable to a format string attack that may exploited by an attacker to crash a victim's IM client, leading to a denial of service. The vulnerability lies in AIM's improper handling of file transfers of filenames containing "%s".
SolutionUpgrade to the latest version of AOL Instant Messenger.